Category: Security

Guarding the Gates: The rise of network protection in the 1990s

Guarding the Gates: The rise of network protection in the 1990s

As part of our 5-part series on the evolution of cybersecurity, check out our second article below that covers how the security industry laid the groundwork for a more holistic approach to cybersecurity. We are continuing our series that explores...

/ October 23, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: HTTP/2 vulnerability

Cybersecurity Threat Advisory: HTTP/2 vulnerability

Amazon Web Services (AWS), Cloudflare, and Google announced measures to mitigate unprecedented distributed denial-of-service (DDoS) attacks that utilize an innovative HTTP/2 Rapid Reset technique. In this Cybersecurity Threat Advisory, learn the details of this threat, what the risks are, and...

/ October 19, 2023
The acute phenomenon of the cybersecurity skills shortage

The acute phenomenon of the cybersecurity skills shortage

Despite ongoing efforts to train recruits, it doesn’t appear that the cybersecurity skills shortage is going to abate any time soon. A survey of 301 IT and cybersecurity professionals conducted by Enterprise Strategy Group, an arm of TechTarget, on behalf...

/ October 19, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco IOS XE zero-day vulnerability

Cybersecurity Threat Advisory: Cisco IOS XE zero-day vulnerability

This latest Cybersecurity Threat Advisory involves a critical authentication bypass zero-day vulnerability (CVE-2023-20198) discovered in Cisco IOS XE software, allowing unauthenticated attackers to gain full administrator privileges over affected routers and switches. This vulnerability is of utmost concern as it...

/ October 18, 2023
Threat Spotlight: How bad bot traffic is changing

Threat Spotlight: How bad bot traffic is changing

Once used primarily by search engines, bots now have a variety of uses — both good and bad. The good bots are primarily search engine crawlers and other similar bots used for aggregating or monitoring content. These bots obey the...

/ October 18, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Significant increase of cyber incidents

Cybersecurity Threat Advisory: Significant increase of cyber incidents

This Cybersecurity Threat Advisory sheds light on the recent global events between Israel and Hamas that have caused a surge in cyber incidents from hacker activists, also known as “hacktivists”. These attacks have been experienced on both sides of the...

/ October 16, 2023
Top 10 cybersecurity misconfigurations identified by CISA and NSA

Top 10 cybersecurity misconfigurations identified by CISA and NSA

The CISA and NSA jointly released a list of the top 10 cybersecurity misconfigurations recently. These misconfigurations often lead to breaches and incidents that should be remedied. The report’s executive summary concludes: “These most common misconfigurations illustrate a trend of...

/ October 12, 2023
Demand for managed cloud services continues to grow

Demand for managed cloud services continues to grow

The managed cloud services market is forecasted to reach $60.7 billion in revenue by 2027 after growing at a 12 percent compound annual rate. The bulk of those managed services are naturally going to be provided by the cloud service...

/ October 11, 2023
cybersecurity
30 tips for Cybersecurity Awareness Month 

30 tips for Cybersecurity Awareness Month 

In collaboration with the National Cybersecurity Alliance, the National Cybersecurity Division of the Department of Homeland Security has been recognizing National Cybersecurity Awareness Month every October since 2004. The goal is to educate individuals and businesses on cyber risks and...

/ October 11, 2023
Quishing: What you need to know about QR code email attacks

Quishing: What you need to know about QR code email attacks

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...

/ October 10, 2023